Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Junsong Fu
@article{DBLP:journals/soco/CuiCSDXF24, author = {Zhiwei Cui and Baojiang Cui and Li Su and Haitao Du and Jie Xu and Junsong Fu}, title = {A formal security analysis of the fast authentication procedure based on the security context in 5G networks}, journal = {Soft Comput.}, volume = {28}, number = {3}, pages = {1865--1881}, year = {2024}, url = {https://doi.org/10.1007/s00500-023-09486-x}, doi = {10.1007/S00500-023-09486-X}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/CuiCSDXF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangZWGFL24, author = {Na Wang and Wen Zhou and Jingjing Wang and Yifan Guo and Junsong Fu and Jianwei Liu}, title = {Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2454--2469}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3350909}, doi = {10.1109/TIFS.2024.3350909}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangZWGFL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WangHFL23, author = {Na Wang and Qingyun Han and Junsong Fu and Jianwei Liu}, title = {Multiuser Personalized Ciphertext Retrieval Scheme Based on Deep Learning}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {24}, pages = {22791--22805}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3305359}, doi = {10.1109/JIOT.2023.3305359}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/WangHFL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangZZQFLB23, author = {Na Wang and Shancheng Zhang and Zheng Zhang and Jiawen Qiao and Junsong Fu and Jianwei Liu and Bharat K. Bhargava}, title = {Lightweight and Secure Data Transmission Scheme Against Malicious Nodes in Heterogeneous Wireless Sensor Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {4652--4667}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3297904}, doi = {10.1109/TIFS.2023.3297904}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangZZQFLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CuiCFB23, author = {Zhiwei Cui and Baojiang Cui and Junsong Fu and Bharat K. Bhargava}, title = {An Attack to One-Tap Authentication Services in Cellular Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {5082--5095}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3304840}, doi = {10.1109/TIFS.2023.3304840}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CuiCFB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/WangZZFLW23, author = {Na Wang and Shancheng Zhang and Zheng Zhang and Junsong Fu and Jianwei Liu and Ruijin Wang}, title = {Block-Based Privacy-Preserving Healthcare Data Ranked Retrieval in Encrypted Cloud File Systems}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {27}, number = {2}, pages = {732--743}, year = {2023}, url = {https://doi.org/10.1109/JBHI.2022.3212684}, doi = {10.1109/JBHI.2022.3212684}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/titb/WangZZFLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WangFZZQLB23, author = {Na Wang and Junsong Fu and Shancheng Zhang and Zheng Zhang and Jiawen Qiao and Jianwei Liu and Bharat K. Bhargava}, title = {Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {31}, number = {4}, pages = {1550--1565}, year = {2023}, url = {https://doi.org/10.1109/TNET.2022.3218933}, doi = {10.1109/TNET.2022.3218933}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/WangFZZQLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/QiuGLCZSNZFCT23, author = {Chenyang Qiu and Yingsheng Geng and Junrui Lu and Kaida Chen and Shitong Zhu and Ya Su and Guoshun Nan and Can Zhang and Junsong Fu and Qimei Cui and Xiaofeng Tao}, editor = {Ambuj K. Singh and Yizhou Sun and Leman Akoglu and Dimitrios Gunopulos and Xifeng Yan and Ravi Kumar and Fatma Ozcan and Jieping Ye}, title = {3D-IDS: Doubly Disentangled Dynamic Intrusion Detection}, booktitle = {Proceedings of the 29th {ACM} {SIGKDD} Conference on Knowledge Discovery and Data Mining, {KDD} 2023, Long Beach, CA, USA, August 6-10, 2023}, pages = {1965--1977}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3580305.3599238}, doi = {10.1145/3580305.3599238}, timestamp = {Mon, 25 Sep 2023 08:29:22 +0200}, biburl = {https://dblp.org/rec/conf/kdd/QiuGLCZSNZFCT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-10955, author = {Zhiwei Cui and Baojiang Cui and Li Su and Haitao Du and Hongxin Wang and Junsong Fu}, title = {Attacks Against Security Context in 5G Network}, journal = {CoRR}, volume = {abs/2303.10955}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.10955}, doi = {10.48550/ARXIV.2303.10955}, eprinttype = {arXiv}, eprint = {2303.10955}, timestamp = {Wed, 22 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-10955.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-11079, author = {Chenyang Qiu and Yingsheng Geng and Junrui Lu and Kaida Chen and Shitong Zhu and Ya Su and Guoshun Nan and Can Zhang and Junsong Fu and Qimei Cui and Xiaofeng Tao}, title = {3D-IDS: Doubly Disentangled Dynamic Intrusion Detection}, journal = {CoRR}, volume = {abs/2307.11079}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.11079}, doi = {10.48550/ARXIV.2307.11079}, eprinttype = {arXiv}, eprint = {2307.11079}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-11079.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/ZhengWLZHZWF22, author = {Kaifa Zheng and Na Wang and Jianwei Liu and Shancheng Zhang and Qingyun Han and Zheng Zhang and Ruijin Wang and Junsong Fu}, title = {An efficient multikeyword fuzzy ciphertext retrieval scheme based on distributed transmission for Internet of Things}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {10}, pages = {7419--7443}, year = {2022}, url = {https://doi.org/10.1002/int.22886}, doi = {10.1002/INT.22886}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/ZhengWLZHZWF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/FuWNCB22, author = {Junsong Fu and Na Wang and Leyao Nie and Baojiang Cui and Bharat K. Bhargava}, title = {Defending Trace-Back Attack in 3D Wireless Internet of Things}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {30}, number = {4}, pages = {1765--1779}, year = {2022}, url = {https://doi.org/10.1109/TNET.2022.3149293}, doi = {10.1109/TNET.2022.3149293}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/FuWNCB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/FuWCB22, author = {Junsong Fu and Na Wang and Baojiang Cui and Bharat K. Bhargava}, title = {A Practical Framework for Secure Document Retrieval in Encrypted Cloud File Systems}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {33}, number = {5}, pages = {1246--1261}, year = {2022}, url = {https://doi.org/10.1109/TPDS.2021.3107752}, doi = {10.1109/TPDS.2021.3107752}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/FuWCB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccir/WuZF22, author = {Junjie Wu and Jingling Zhao and Junsong Fu}, title = {A Static Method to Discover Deserialization Gadget Chains in Java Programs}, booktitle = {Proceedings of the 2nd International Conference on Control and Intelligent Robotics, {ICCIR} 2022, Nanjing, China, June 24-26, 2022}, pages = {800--805}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548608.3559310}, doi = {10.1145/3548608.3559310}, timestamp = {Wed, 26 Oct 2022 14:31:02 +0200}, biburl = {https://dblp.org/rec/conf/iccir/WuZF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/WangJZLZFQ22, author = {Na Wang and Jian Jiao and Shangcheng Zhang and Jianwei Liu and Kaifa Zheng and Junsong Fu and Jiawen Qiao}, editor = {Yuan Xu and Hongyang Yan and Huang Teng and Jun Cai and Jin Li}, title = {Privacy-Preserving Searchable Encryption Scheme Based on Deep Structured Semantic Model over Cloud Application}, booktitle = {Machine Learning for Cyber Security - 4th International Conference, {ML4CS} 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13656}, pages = {584--608}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20099-1\_49}, doi = {10.1007/978-3-031-20099-1\_49}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/WangJZLZFQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/CuiCSDWF22, author = {Zhiwei Cui and Baojiang Cui and Li Su and Haitao Du and Hongxin Wang and Junsong Fu}, editor = {Ilsun You and Hwankuk Kim and Pelin Angin}, title = {Attacks Against Security Context in 5G Network}, booktitle = {Mobile Internet Security - 6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1644}, pages = {3--17}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-4430-9\_1}, doi = {10.1007/978-981-99-4430-9\_1}, timestamp = {Thu, 20 Jul 2023 11:43:54 +0200}, biburl = {https://dblp.org/rec/conf/mobisec2/CuiCSDWF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/WangCFX21, author = {Na Wang and Yuanyuan Cai and Junsong Fu and Jie Xu}, title = {Privacy-Preserving Efficient Data Retrieval in IoMT Based on Low-Cost Fog Computing}, journal = {Complex.}, volume = {2021}, pages = {6211475:1--6211475:13}, year = {2021}, url = {https://doi.org/10.1155/2021/6211475}, doi = {10.1155/2021/6211475}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/complexity/WangCFX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/WangLFZ21, author = {Na Wang and Jian Li and Junsong Fu and Yan Zheng}, title = {Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet}, journal = {Mob. Networks Appl.}, volume = {26}, number = {4}, pages = {1430--1439}, year = {2021}, url = {https://doi.org/10.1007/s11036-019-01460-y}, doi = {10.1007/S11036-019-01460-Y}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/monet/WangLFZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChengCQYF21, author = {Zishuai Cheng and Baojiang Cui and Tao Qi and Wenchuan Yang and Junsong Fu}, title = {An Improved Feature Extraction Approach for Web Anomaly Detection Based on Semantic Structure}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6661124:1--6661124:11}, year = {2021}, url = {https://doi.org/10.1155/2021/6661124}, doi = {10.1155/2021/6661124}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ChengCQYF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangCFC20, author = {Na Wang and Yuanyuan Cai and Junsong Fu and Xiqi Chen}, title = {Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme}, journal = {{IEEE} Access}, volume = {8}, pages = {20799--20804}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2968728}, doi = {10.1109/ACCESS.2020.2968728}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangCFC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiuCFM20, author = {Xinyao Liu and Baojiang Cui and Junsong Fu and Jinxin Ma}, title = {HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations}, journal = {Future Gener. Comput. Syst.}, volume = {108}, pages = {390--400}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.12.032}, doi = {10.1016/J.FUTURE.2019.12.032}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiuCFM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/FuWC20, author = {Junsong Fu and Na Wang and Yuanyuan Cai}, title = {Privacy-Preserving in Healthcare Blockchain Systems Based on Lightweight Message Sharing}, journal = {Sensors}, volume = {20}, number = {7}, pages = {1898}, year = {2020}, url = {https://doi.org/10.3390/s20071898}, doi = {10.3390/S20071898}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/FuWC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/0003FLB20, author = {Na Wang and Junsong Fu and Jian Li and Bharat K. Bhargava}, title = {Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {100--114}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2919388}, doi = {10.1109/TIFS.2019.2919388}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/0003FLB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/ChengCF20, author = {Zishuai Cheng and Baojiang Cui and Junsong Fu}, editor = {Yang Xiang and Zheli Liu and Jin Li}, title = {A Novel Web Anomaly Detection Approach Based on Semantic Structure}, booktitle = {Security and Privacy in Social Networks and Big Data - 6th International Symposium, SocialSec 2020, Tianjin, China, September 26-27, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1298}, pages = {20--33}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-9031-3\_2}, doi = {10.1007/978-981-15-9031-3\_2}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/socialsec/ChengCF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/FuW19, author = {Junsong Fu and Na Wang}, title = {A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing}, journal = {{IEEE} Access}, volume = {7}, pages = {36218--36232}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2905346}, doi = {10.1109/ACCESS.2019.2905346}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/FuW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/FuCWL19, author = {Junsong Fu and Baojiang Cui and Na Wang and Xinyao Liu}, title = {A Distributed Position-Based Routing Algorithm in 3-D Wireless Industrial Internet of Things}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {15}, number = {10}, pages = {5664--5673}, year = {2019}, url = {https://doi.org/10.1109/TII.2019.2908439}, doi = {10.1109/TII.2019.2908439}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/FuCWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangFZB18, author = {Na Wang and Junsong Fu and Jiwen Zeng and Bharat K. Bhargava}, title = {Source-location privacy full protection in wireless sensor networks}, journal = {Inf. Sci.}, volume = {444}, pages = {105--121}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.02.064}, doi = {10.1016/J.INS.2018.02.064}, timestamp = {Wed, 05 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangFZB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangFBZ18, author = {Na Wang and Junsong Fu and Bharat K. Bhargava and Jiwen Zeng}, title = {Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {10}, pages = {2653--2667}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2825952}, doi = {10.1109/TIFS.2018.2825952}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangFBZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/FuLCBZ18, author = {Junsong Fu and Yun Liu and Han{-}Chieh Chao and Bharat K. Bhargava and Zhen{-}Jiang Zhang}, title = {Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {14}, number = {10}, pages = {4519--4528}, year = {2018}, url = {https://doi.org/10.1109/TII.2018.2793350}, doi = {10.1109/TII.2018.2793350}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/FuLCBZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.